aiotestking uk

400-101 Exam Questions - Online Test


400-101 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Refer to the exhibit. 

You are bringing a new MPLS router online and have configured only what is shown to bring LDP up. Assume that the peer has been configured in a similar manner. You verify the LDP peer state and see that there are no neighbors. What will the output of show mpls ldp discovery show? 

A. Interfaces: 

Ethernet0/0 (ldp): xmit 

B. Interfaces: 

Ethernet0/0 (ldp): xmit/recv 

LDP Id: 25.25.25.2:0; IP addr: 192.168.12.2 

C. Interfaces: 

Ethernet0/0 (ldp): xmit/recv 

LDP Id: 192.168.12.2:0; no route 

D. Interfaces: 

Ethernet0/0 (ldp): xmit/recv 

LDP Id: 25.25.25.2:0; no route 

Answer:

Q2. Refer to the exhibit. 

R1 is able to reach only some of the subnets that R2 is advertising. Which two configuration changes can you make to ensure that R1 can reach all routes from R2? (Choose two.) 

A. Add an additional permit statement to the LOOPBACKS route map. 

B. Modify the LOOPBACKS access list to include all loopback subnets. 

C. Add an additional statement in the LOOPBACKS route map to match both Level 1 and Level 2 circuits. 

D. Add an additional statement in the LOOPBACKS route map to match the R1 CLNS address. 

E. Configure the interfaces between R1 and R2 with a Level 1 IS-IS circuit. 

F. Configure the interfaces between R1 and R2 with a Level 2 IS-IS circuit. 

Answer: A,B 

Explanation: 

In this example, the access list is using a 0.0.3.255 wildcard mask, so only the loopback IP’s of 172.16.0.0 – 172.16.3.255 will be included. We need to add another statement to allow loopback 4 to be advertised, or modify the wildcard mask to include them all. 

Q3. Which two statements about port ACLs are true? (Choose two.) 

A. Port ACLs are supported on physical interfaces and are configured on a Layer 2 interface on a switch. 

B. Port ACLs support both outbound and inbound traffic filtering. 

C. When it is applied to trunk ports, the port ACL filters only native VLAN traffic. 

D. When it is applied to a port with voice VLAN, the port ACL filters both voice and data VLAN traffic. 

Answer: A,D 

Explanation: 

PACLs filter incoming traffic on Layer 2 interfaces, using Layer 3 information, Layer 4 header information, or non-IP Layer 2 information The port ACL (PACL) feature provides the ability to perform access control on specific Layer 2 ports. A Layer 2 port is a physical LAN or trunk port that belongs to a VLAN. Port ACLs perform access control on all traffic entering the specified Layer 2 port, including voice and data VLANs that may be configured on the port. Port ACLs are applied only on the ingress traffic. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/configuration/guide/sy_swcg/port_acls.html 

Q4. Under which condition does UDP dominance occur? 

A. when TCP traffic is in the same class as UDP 

B. when UDP flows are assigned a lower priority queue 

C. when WRED is enabled 

D. when ACLs are in place to block TCP traffic 

Answer:

Q5. Which option describes a limitation of Embedded Packet Capture? 

A. It can capture data only on physical interfaces and subinterfaces. 

B. It can store only packet data. 

C. It can capture multicast packets only on ingress. 

D. It can capture multicast packets only on egress. 

Answer:

Explanation: 

Restrictions for Embedded Packet Capture 

. In Cisco IOS Release 12.2(33)SRE, EPC is supported only on 7200 platform. 

. EPC only captures multicast packets on ingress and does not capture the replicated packets on egress. 

. Currently, the capture file can only be exported off the device; for example, TFTP or FTP servers and local disk. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/epc/configuration/15-mt/epc-15-mt-book/nm-packet-capture.html 

Q6. Refer to the exhibit. 

Which statement is true? 

A. The output shows an IPv6 multicast address with link-local scope. 

B. The output shows an IPv6 multicast address that is used for unique local sources only. 

C. The output shows an IPv6 multicast address that can be used for BIDIR-PIM only. 

D. The output shows an IPv6 multicast address with embedded RP. 

Answer:

Q7. Which three statements are true about OSPFv3? (Choose three.) 

A. The only method to enable OSPFv3 on an interface is via the interface configuration mode. 

B. Multiple instances of OSPFv3 can be enabled on a single link. 

C. There are two methods to enable OSPFv3 on an interface, either via the interface configuration mode or via the router configuration mode. 

D. For OSPFv3 to function, IPv6 unicast routing must be enabled. 

E. For OSPFv3 to function, IPv6 must be enabled on the interface. 

F. Only one instance of OSPFv3 can be enabled on a single link. 

Answer: B,D,E 

Explanation: 

Here is a list of the differences between OSPFv2 and OSPFv3: 

They use different address families (OSPFv2 is for IPv4-only, OSPFv3 can be used for IPv6-only or both protocols (more on this following)) 

OSPFv3 introduces new LSA types 

OSPFv3 has different packet format 

OSPFv3 uses different flooding scope bits (U/S2/S1) 

OSPFv3 adjacencies are formed over link-local IPv6 communications 

OSPFv3 runs per-link rather than per-subnet 

OSPFv3 supports multiple instances on a single link, Interfaces can have multiple IPv6 addresses 

OSPFv3 uses multicast addresses FF02::5 (all OSPF routers), FF02::6 (all OSPF DRs) 

OSPFv3 Neighbor Authentication done with IPsec (AH) 

OSPFv2 Router ID (RID) must be manually configured, still a 32-bit number 

Following is a simple example of OSPFv3 configuration on a Cisco IOS 12.4T router. 

ipv6 unicast-routing 

ipv6 cef 

interface GigabitEthernet 0/0 

description Area 0.0.0.0 backbone interface 

ipv6 address 2001:DB8:100:1::1/64 

ipv6 ospf network broadcast 

ipv6 ospf 100 area 0.0.0.0 

Reference: http://www.networkworld.com/article/2225270/cisco-subnet/ospfv3-for-ipv4-and-ipv6.html 

Q8. Refer to the exhibit. 

All switches have default bridge priorities, and originate BPDUs with MAC addresses as indicated. The numbers shown are STP link metrics. 

After STP converges, you discover that traffic from switch SWG toward switch SWD takes a less optimal path. What can you do to optimize the STP tree in this switched network? 

A. Change the priority of switch SWA to a lower value than the default value. 

B. Change the priority of switch SWB to a higher value than the default value. 

C. Change the priority of switch SWG to a higher value than the default value. 

D. Change the priority of switch SWD to a lower value than the default value. 

Answer:

Explanation: 

In this topology, we see that all port paths and priorities are the same, so the lowest MAC address will be used to determine the best STP path. From SWG, SWE will be chosen as the next switch in the path because it has a lower MAC address than SWF. From SWE, traffic will go to SWC because it has a lower MAC address, and then to SWD, instead of going from SWE directly to SWD. If we lower the priority of SWD (lower means better with STP) then traffic will be sent directly to SWD. 

Q9. Which type of port would have root guard enabled on it? 

A. A root port 

B. An alternate port 

C. A blocked port 

D. A designated port 

Answer:

Explanation: 

The root guard feature provides a way to enforce the root bridge placement in the network. The root guard ensures that the port on which root guard is enabled is the designated port. Normally, root bridge ports are all designated ports, unless two or more ports of the root bridge are connected together. If the bridge receives superior STP Bridge Protocol Data Units (BPDUs) on a root guard-enabled port, root guard moves this port to a root-inconsistent STP state. This root-inconsistent state is effectively equal to a listening state. No traffic is forwarded across this port. In this way, the root guard enforces the position of the root bridge. 

Reference: http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/10588-74.html 

Q10. Refer to the exhibit. 

Which feature can R1 use to fail over from R2 to R3 if the address for R2 becomes unavailable? 

A. object tracking 

B. HSRP 

C. GLBP 

D. LACP 

Answer:

Explanation: 

The object tracking feature allows you to create a tracked object that multiple clients can use to modify the client behavior when a tracked object changes. Several clients register their interest with the tracking process, track the same object, and take different actions when the object state changes. 

Clients include the following features: 

. Embedded Event Manager (EEM) 

. Gateway Load Balancing Protocol (GLBP) 

. Hot Standby Redundancy Protocol (HSRP) 

. Virtual port channel (vPC) 

. Virtual Router Redundancy Protocol (VRRP) 

The object tracking monitors the status of the tracked objects and communicates any changes made to interested clients. Each tracked object is identified by a unique number that clients can use to configure the action to take when a tracked object changes state. 

Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_cli_nxos/l3_object.html